Chapter 2 Flashcards

1
Q

A ____ attack begins with the attacker creating digests of common dictionary words, and then comparing those in a stolen password file.

A

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise, in an attempt to trick the user into surrendering private information

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering ____ means to create a fictitious character and then play out the role of that person on a victim.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The average phishing site only exists for ____ days to prevent law enforcement agencies from tracking the attackers.

A

3.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whereas phishing involves sending millions of generic e-mail messages to users, ____ targets only specific users.

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ identify individuals within the organization who are in positions of authority.

A

Organizational charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ may reveal the true level of security within the organization.

A

Policy manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ involves using someone’s personal information, such as a Social Security number, to establish bank or credit card accounts that are then left unpaid, leaving the victim with the debts and ruining their credit rating

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Grouping individuals and organizations into clusters or groups based on their likes and interests is called ____.

A

social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Web sites that facilitate linking individuals with common interests and function as an online community of users are called ____

A

social networking sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ means an attacker who pretends to be from a legitimate research firm asks for personal information

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stolen wallets and purses contain personal information that can be used in identity theft. This is known as ____.

A

stealing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a standard ____ form, attackers can divert all mail to their post office box so that the victim never sees any charges made.

A

change-of-address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The best approach to establishing strong security with passwords is to use a ____

A

password management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a program that lets a user create and store multiple strong passwords in a single user database file that is protected by one strong master password.

A

password management application

17
Q

The ____ of 2003 contains rules regarding consumer privacy.

A

Fair and Accurate Credit Transactions Act

18
Q

FACTA grants consumers the right to request one free credit report from each of the three national credit-reporting firms every ____.

19
Q

If a consumer finds a problem on her credit report, she must first send a letter to the credit-reporting agency. Under federal law, the agency has ____ days to investigate and respond to the alleged inaccuracy and issue a corrected report

20
Q

A ____ is a numerical measurement used by lenders to assess a consumer’s creditworthiness.

A

Credit Score

21
Q

Credit score reports cost about ____.

22
Q

use of a telephone call instead of e-mail to contact a potential victim

23
Q

one type of spear phishing

24
Q

information entered is observed by another person

A

Shoulder surfing

25
any secret combination of letters, numbers, and/or symbols that serves to validate or authenticate a user by what she knows
Password
26
trying to guess a password through combining a systematic combination of characters
Brute force attacks
27
means of gathering information for an attack by relying on the weaknesses of individuals
Social Engineering
28
WUuAxB2aWBndTf7MfEtm is an example of this
Strong Password
29
process that confirms a user’s identity
Authentication
30
once an authorized person opens the door then virtually any number of individuals can follow behind and also enter the building or area
Tailgating